Skip to content

HackerTor

Fresh hacking articles every day

Tag: Hacks

HackerTor

PoC Code Surfaces to Exploit Apache Struts 2 Vulnerability

Researchers find proof-of-concept code that can take advantage of the recently identified Apache Struts framework (CVE-2018-11776) vulnerability.

Link: https://threatpost.com/poc-code-surfaces-to-exploit-apache-struts-2-vulnerability/136921/

HackerTor

T-Mobile Alerts 2.3 Million Customers of Data Breach Tied to Leaky API

T-Mobile alerts millions of its customers to a breach of its website that resulted in subscriber names, zip codes, phone numbers, email addresses and account numbers being stolen.

Link: https://threatpost.com/t-mobile-alerts-2-3-million-customers-of-data-breach-tied-to-leaky-api/136896/

HackerTor

Cheddar’s Restaurants Bitten By Credit-Card Breach

Restaurants in 23 states were compromised for two months.

Link: https://threatpost.com/cheddars-restaurants-bitten-by-credit-card-breach/136876/

HackerTor

DNC: Highly Publicized ‘Phishing Attempt’ Was Only a Security Test

DNC officials and Lookout believed a spoofed site was built to harvest authentication details for the Democratic voter database.

Link: https://threatpost.com/dnc-highly-publicized-phishing-attempt-was-only-a-security-test/136828/

HackerTor

DNC Becomes Latest Target in Series of Election-Season Attacks

The DNC thwarts a phishing effort aimed at its voter database, days after Microsoft’s Fancy Bear disruption and Facebook’s efforts against Iranian propaganda.

Link: https://threatpost.com/dnc-becomes-latest-target-in-series-of-election-season-attacks/136814/

HackerTor

Podcast: Bad Packets Report Founder on Rising Cryptojacking Attacks

Cryptojacking attacks are on the rise. We talk to security researcher Troy Mursch about why bad actors are drawn to this attack technique.

Link: https://threatpost.com/podcast-bad-packets-report-founder-on-rising-cryptojacking-attacks/136778/

HackerTor

Belkin IoT Smart Plug Flaw Allows Remote Code Execution in Smart Homes

An unpatched buffer overflow flaw allows remote attackers to completely take over the device and enter the home network.

Link: https://threatpost.com/belkin-iot-smart-plug-flaw-allows-remote-code-execution-in-smart-homes/136732/

HackerTor

Side-Channel PoC Attack Targets Encryption Software Glitch

Researchers launched a Proof-of-Concept attack on two Android mobile phones and an embedded system board.

Link: https://threatpost.com/side-channel-poc-attack-targets-encryption-software-glitch/136703/

HackerTor

Darkhotel Exploits Microsoft Zero-Day VBScript Flaw

The recently-patched flaw could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.

Link: https://threatpost.com/darkhotel-exploits-microsoft-zero-day-vbscript-flaw/136685/

HackerTor

Unique Malspam Campaign Uses MS Publisher to Drop a RAT on Banks

A new email campaign includes a Microsoft Office Publisher file with malicious URLs leading to the FlawedAmmyy RAT.

Link: https://threatpost.com/unique-malspam-campaign-uses-ms-publisher-to-drop-a-rat-on-banks/136656/

  • 1
  • 2
  • 3
  • …
  • 41
  • >

Recent Posts

  • Who’s Behind the Screencam Extortion Scam?
  • NA – CVE-2018-15842 – WolfCMS 0.8.3.1 has XSS via the…
  • NA – CVE-2018-15843 – GetSimple CMS 3.3.14 has XSS via the…
  • NA – CVE-2018-15844 – An issue was discovered in DamiCMS 6.0.0. There…
  • NA – CVE-2018-15845 – There is a CSRF vulnerability that can add an…

Archives

  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016

Tags

Android Cloud Security Code Scripting Cryptography Data security Enterprise Security Weekly Framework google Government hacking Hacks interview IoT Kali Linux Linux Mac Malware Microsoft Mobile Security Networking News Open Source Other Paul's Security Weekly paul asadoorian Penetration Test Penetration Testing powershell Privacy Python Python Script r/blackhat ransomware Scan Scanner security Security Tools security weekly Tools Uncategorized Vulnerabilities Vulnerability Scanner webapps Web Security Windows
Proudly powered by WordPress | Theme: Amadeus by Themeisle.